The SCEAS System
Navigation Menu

Conferences in DBLP

Security in Information Systems (sis)
2005 (conf/sis/2005)

  1. Siraj A. Shaikh, Vicky J. Bush
    Analysing the Woo-Lam Protocol Using CSP and Rank Functions. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:3-12 [Conf]
  2. Shuyao Yu, Youkun Zhang, Runguo Ye, Chuck Song
    A Secure Hash-Based Strong-Password Authentication Scheme. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:13-20 [Conf]
  3. H. A. Eneh, O. Gemikonakli
    An Approach for the Analysis of Security Standards for Authentication in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:21-30 [Conf]
  4. M. Choudary Gorantla, Raju Gangishetti, Manik Lal Das, Ashutosh Saxena
    An Effective Certificateless Signature Scheme Based on Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:31-39 [Conf]
  5. Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati
    ID-based Serial Multisignature Scheme using Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:40-47 [Conf]
  6. Changshe Ma, Kefei Chen, Shengli Liu, Dong Zheng
    Transitive Signatures Based on Bilinear Maps. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:48-56 [Conf]
  7. Robson de Oliveira Albuquerque, Maíra Hanashiro, Rafael Timóteo de Sousa Júnior, Cláudia J. Barenco Abbas, Luis Javier García-Villalba
    MANET - Auto Configuration with Distributed Certification Authority models Considering Routing Protocols Usage. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:57-66 [Conf]
  8. Robson de Oliveira Albuquerque, Daniel Silva Almendra, Leonardo Lobo Pulcineli, Rafael Timóteo de Sousa Júnior, Cláudia J. Barenco Abbas, Luis Javier García-Villalba
    SisBrAV - Brazilian Vulnerability Alert System. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:67-76 [Conf]
  9. Sushan Sudaharan, Srikrishna Dhammalapati, Sijan Rai, Duminda Wijesekera
    Honeynet Clusters as an early Warning System for Production Networks. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:77-83 [Conf]
  10. Cláudia J. Barenco Abbas, Alessandra Lafetá, Giuliano Arruda, Luis Javier García-Villalba
    A Honeypot Implementation as Part of the Brazilian Distributed Honeypots Project and Statistical Analysis of Attacks Against a University's Network. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:84-93 [Conf]
  11. Ulf T. Mattsson
    A Real-time Intrusion Prevention System for Commercial Enterprise Databases and File Systems. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:94-101 [Conf]
  12. Jiande Zheng
    Public-Key Encryption Based on Matrix Diagonalization Problem. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:102-112 [Conf]
  13. Guangsen Zhang, Manish Parashar
    Cooperative Defense against Network Attacks. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:113-122 [Conf]
  14. Christos K. Dimitriadis, Despina Polemi
    A Protocol for Incorporating Biometrics in 3G with Respect to Privacy. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:123-135 [Conf]
  15. Vaibhav Gowadia, Csilla Farkas
    Tree Automata for Schema-level Filtering of XML Associations . [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:136-145 [Conf]
  16. Chunxiao Ye, Zhongfu Wu, Yunqing Fu
    An Attribute-Based-Delegation-Model and Its Extension. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:146-159 [Conf]
  17. Sabah S. Al-Fedaghi
    A Systematic Approach to Anonymity. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:160-172 [Conf]
  18. Claudine Conrado, Milan Petkovic, Michiel van der Veen, Wytse van der Velde
    Controlled Sharing of Personal Content using Digital Rights Management. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:173-185 [Conf]
  19. Marco Voss, Wolfram Wiesemann
    Using Reputation Systems to Cope with Trust Problems in Virtual Organizations. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:186-195 [Conf]
  20. Yanjun Zuo, Brajendra Panda
    External Object Trust Zone Mapping for Information Clustering. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:196-206 [Conf]
  21. Eduardo B. Fernández, Tami Sorgente, María M. Larrondo-Petrie
    A UML-Based Methodology for Secure Systems: The Design Stage . [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:207-216 [Conf]
  22. Rodolfo Villarroel, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini
    Towards a UML 2.0/OCL extension for designing Secure Data Warehouses. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:217-228 [Conf]
  23. Khaled Alghathbar, Duminda Wijesekera, Csilla Farkas
    Secure UML Information Flow using FlowUML. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:229-238 [Conf]
  24. Wes Sonnenreich, Jason Albanese, Bruce Stout
    Return On Security Investment (ROSI): A Practical Quantitative Model. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:239-252 [Conf]
  25. Subhas C. Misra, Vinod Kumar, Uma Kumar
    An Approach for Modeling Information Systems Security Risk Assessment. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:253-262 [Conf]
  26. Peter D. Zegzhda, Dmitry P. Zegzhda, Maxim O. Kalinin
    Detection of the Operating System Configuration Vulnerabilities with Safety Evaluation Facility. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:263-276 [Conf]
  27. Thuong Doan, Laurent D. Michel, Steven A. Demurjian, T. C. Ting
    Stateful Design for Secure Information Systems. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:277-286 [Conf]
  28. Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini
    Towards an integration of Security Requirements into Business Process Modeling. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:287-297 [Conf]
  29. Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini
    Towards a Process for Web Services Security. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:298-308 [Conf]
  30. Christine E. Drake, Andrew Klein, Jonathan J. Oliver
    Analysis of the Phishing Email Problem and Discussion of Possible Solutions. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:309-318 [Conf]
  31. Wiebe K. Wiechers, Semir Daskapan
    Validating the Security of Medusa: A survivability Protocol for Security Systems. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:319-330 [Conf]
  32. Serge Chaumette, Damien Sauveron
    An Efficient and Simple Way to Test the Security of Java CardsTM. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:331-341 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002